Method for using BMC as proxy NVMeoF discovery controller to provide NVM subsystems to host

-

A management device that may communicate with at least one devices is disclosed. The management device may include a communication logic to communicate with the devices over a communication channels about data associated with the devices. The management device may also include reception logic that may receive a query from a host. The query may request information from the management device about the devices. The management device may also include a transmission logic to send the data about the devices to the host. The host may be configured to send a message to the devices.

Skip to: Description  ·  Claims  ·  References Cited  · Patent History  ·  Patent History
Description
RELATED APPLICATION DATA

This application is a continuation of U.S. patent application Ser. No. 16/424,474, filed May 28, 2019, now allowed, which is a continuation of U.S. patent application Ser. No. 15/345,507, filed Nov. 7, 2016, now U.S. Pat. No. 10,346,041, issued Jul. 9, 2019, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/394,726, filed Sep. 14, 2016, all of which are incorporated by reference herein for all purposes.

This application is related to U.S. patent application Ser. No. 15/256,495, filed Sep. 2, 2016, now allowed, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/366,622, filed Jul. 26, 2016, both of which are incorporated by reference herein for all purposes.

This application is related to U.S. patent application Ser. No. 15/345,509, filed Nov. 7, 2016, now pending, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/394,727, filed Sep. 14, 2016, both of which are incorporated by reference herein for all purposes.

FIELD

The inventive concepts relate generally to Non-Volatile Memory Express Over Fabric (NVMeoF) systems, and more particularly to using a proxy for the host to discover installed NVMeoF devices.

BACKGROUND

Excerpts from the Non-Volatile Memory (NVM) Express (NVMe) over Fabrics (NVMeoF) specification 1.0, section 1.5.6, defines a discovery mechanism that a host may use to determine the NVM subsystems the host may access. A Discovery controller supports minimal functionality and only implements the required features that allow the Discovery Log Page to be retrieved. A Discovery controller does not implement Input/Output (I/O) queues or expose namespaces. A Discovery Service is an NVM subsystem that exposes only Discovery controllers. The method that a host uses to obtain the information necessary to connect to the initial Discovery Service is implementation specific.

The Discovery Log Page provided by a Discovery Controller contains one or more entries. Each entry specifies information necessary for the host to connect to an NVM subsystem via an NVMe Transport. An entry may specify an NVM subsystem that exposes namespaces that the host may access, or a referral to another Discovery Service. The maximum referral depth supported is eight levels.

The Baseboard Management Controller (BMC) has been widely used in servers, PCs, switches and other computer-based products. Generally speaking, the BMC depends on host processor and/or operating systems to initiate and complete the discovery process. In addition, the BMC does not care about what chassis it is in, since its main job is to monitor the health status of the system.

The sensors associated with the BMC measure internal physical variables such as temperature, humidity, power-supply voltage, fan speeds, communications parameters, and operating system (OS) functions. If any of these variables happens to stray outside specified limits, the administrator is notified. That person may then take corrective action by remote control. In some cases, the BMC may take some corrective actions such as increasing fan speeds or rebooting the failed subsystems. The monitored device/system may be power cycled or rebooted remotely, as necessary and/or appropriate. In this way, a single administrator may remotely manage numerous servers and other devices simultaneously, saving on the overall operating cost of the network and helping to ensure its reliability.

A need remains for a way for to reduce the time required for the host to identify all NVM devices in the chassis.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a chassis with a self-configuring Baseboard Management Controller (BMC) installed therein that may perform discovery of Non-Volatile Memory (NVM) devices, according to an embodiment of the inventive concept.

FIG. 2 shows additional details of the chassis of FIG. 1.

FIG. 3 shows the BMC of FIG. 1 communicating with devices on a mid-plane of the chassis of FIG. 1.

FIG. 4 shows details of the BMC of FIG. 1.

FIG. 5 shows details of the access logic of FIG. 4.

FIG. 6 shows the BMC of FIG. 1 with pins for signaling.

FIG. 7 shows the chassis of FIG. 1 in a High Availability configuration.

FIG. 8 shows the built-in self-configuration logic of FIG. 4.

FIG. 9 shows various sources for the drivers of FIG. 8.

FIG. 10 shows the device communication logic of FIG. 4.

FIG. 11 shows the host of FIG. 1 requesting a Discovery Log Page from the BMC of FIG. 1.

FIGS. 12A-12D show a flowchart of an example procedure for the BMC of FIG. 1 to self-configure, according to an embodiment of the inventive concept.

FIG. 13 shows a flowchart of an example procedure for access logic of FIG. 4 to determine the configuration of the chassis of FIG. 1.

FIG. 14 shows a flowchart of an example procedure for the BMC of FIG. 1 to perform discovery of NVM devices in the chassis of FIG. 1, according to an embodiment of the inventive concept.

FIG. 15 shows a flowchart of an example procedure for the device communication logic of FIG. 4 to obtain discovery information about the NVM devices of FIG. 3 in the chassis of FIG. 1.

FIG. 16 shows a flowchart of an example procedure for the BMC of FIG. 1 to build a record of the device(s) configurations.

FIG. 17 shows a flowchart of an example procedure for an NVM device in the chassis of FIG. 1 to inform the BMC of FIG. 1 about a change in the configuration of the NVM device, according to an embodiment of the inventive concept.

DETAILED DESCRIPTION

Reference will now be made in detail to embodiments of the inventive concept, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth to enable a thorough understanding of the inventive concept. It should be understood, however, that persons having ordinary skill in the art may practice the inventive concept without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.

It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first module could be termed a second module, and, similarly, a second module could be termed a first module, without departing from the scope of the inventive concept.

The terminology used in the description of the inventive concept herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the inventive concept. As used in the description of the inventive concept and the appended claims, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The components and features of the drawings are not necessarily drawn to scale.

U.S. patent application Ser. No. 15/256,495, filed Sep. 2, 2016, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/366,622, filed Jul. 26, 2016, both of which are incorporated by reference herein for all purposes, describes a self-discovery process by which Non-Volatile Memory (NVM) devices may perform self-discovery. This process may be extended to Baseboard Management Controllers (BMCs) that may perform self-discovery to get “Chassis Personality” information to complement self-configuring Solid-State Drives (SSDs).

The new BMC may perform the self-discovery process during boot up initialization. By reading “Chassis Personality” information from a known location of an Electrically Erasable Programmable Read Only Memory (EEPROM)—such as Vital Product Data (VPD) on the mid-plane—chassis-specific data may be obtained, and the BMC may respond appropriately. The BMC may discover, for example, whether it is in an NVM Express (NVMe) or NVMe over Fabric (NVMeoF) chassis. If the BMC is in an NVMeoF chassis, the BMC may enable appropriate NVMeoF functionalities such as Discovery Services, robust error reporting, and management capabilities, as well as multi-pathing BMCs in high availability configurations.

If the BMC self-discovery reveals that it is in an NVMe chassis, then the BMC may operate as a conventional BMC: i.e., no NMVeoF support. In NVMe mode, the drive discovery may be done through in-band PCI Express initialization/link training process. Thus, the new BMC may be used in both NVMe-based and NVMeoF-based systems.

In a large NMVeoF storage system, a BMC that may perform self-discovery may shorten the enumeration/discovery process significantly because:

    • All Network-attached SSD (NASSD) devices present in the system may perform self-discovery (as disclosed in U.S. patent application Ser. No. 15/256,495, filed Sep. 2, 2016, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/366,622, filed Jul. 26, 2016, both of which are incorporated by reference herein for all purposes) independently by reading from a known location from the system much quicker than a host CPU may.
    • The new BMC may perform self-discovery by reading from a known location for BMCs only, and be ready to behave appropriately in a much shorter period of time than that required by having a remote host/local processor ping/discover each device in the chassis, including the BMC.

Newer storage devices (or other devices, such as Network Interface Cards (NICs)) may use transport protocols such as NVMeoF to communicate with a chassis (also termed a host machine), and may support multiple transport protocols. When such devices are installed in a chassis, these devices may perform self-discovery during boot up and initialization. These devices may read VPD from a known location in an EEPROM: U.S. patent application Ser. No. 15/256,495, filed Sep. 2, 2016, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/366,622, filed Jul. 26, 2016, both of which are incorporated by reference herein for all purposes, describes such a self-discovery process.

Once self-discovery has started, these devices may then discover that they are installed in an NVMeoF chassis. These devices may then configure themselves to enable, for example, the Ethernet ports and disabling other unnecessary/unused/unsupported transport protocol support. In this way the operating system and host processor overhead related to multiple transport protocol discovery and management may be avoided.

In a large storage system, using such self-configuring devices may shorten the enumeration process significantly because all devices may perform self-discovery independently by reading from known location(s) from the system. The host processors and operating systems are not required to be present.

A BMC is a low-power controller embedded in servers or switches. A BMC may connect to sensors to read environmental conditions and to control devices. A BMC has all the connections to all NVMeoF devices via the control plane/path. Therefore, it is advantageous to use a BMC as a proxy for providing discovery services to the host or initiator. Due to its interaction with many devices, a BMC may serve as a Discovery Controller to provide a list of NVM subsystems that are accessible to the host.

The BMC presented herein may have firmware to perform discovery of eSSDs, Network-Attached Solid State Drives, or other devices inserted into the system. Network-Attached SSDs may include Ethernet SSDs, InfiniBand SSDs, Fibre-Channel SSDs, SSDs, or SSDs that offer a combination of these transport protocols (Ethernet, InfiniBand and, and Fibre-Channel). Ethernet, InfiniBand and, and Fibre-Channel transport protocols are merely exemplary, and embodiments of the inventive concept may include Network-Attached SSDs that support other transport protocols. The BMC may directly access each device through a private bus and a Complex Programmable Logic Device (CPLD). The BMC may also read a known non-volatile memory location on the mid-plane where each device reports its information. This method may shorten the enumeration process. The BMC may store each device's information as a Discovery Log Page in its non-volatile memory.

The BMC may communicate with devices using a control plane. The control plane, the data plane and the management plane are the three basic components of telecommunications products. The control plane is the part of a network that carries signaling traffic and is responsible for routing. Functions of the control plane include system configuration and management. The control plane and management plane serve the data plane, which bears the traffic that the network exists to carry. The management plane, which carries administrative traffic, is considered a subset of the control plane.

A new Intelligent Platform Management Interface (IPMI) command (System Discovery) may be supported by the BMC's firmware for local or remote hosts to retrieve this Discovery Log Page. Remote hosts may connect to the BMC through its Local Area Network (LAN) interface if they are in the same network. Remote hosts may also connect to the BMC's local host. Each entry in the Discovery Log Page may specify information necessary for the host to connect to an NVM subsystem via an NVMe Transport.

The NVMeoF standard specifies Discovery service may be performed via Ethernet links or via the data plane. In contrast, embodiments of the inventive concept use the BMC as a proxy, which enables discovery services to be performed via the control plane. In networking, the control plane is typically limited to only a system administrator, and is better protected than data plane, which may be accessed by many people/nodes. In terms of security, the control plane is better protected than data plane. In addition, system administrators may issue one command to a BMC to get all discovery log files from all NVMeoF devices instead of issuing one command per device, as specified by the standard.

FIG. 1 shows a chassis with a self-configuring Baseboard Management Controller (BMC) installed therein that may perform discovery of Non-Volatile Memory (NVM) devices, according to an embodiment of the inventive concept. In FIG. 1, chassis 105 is shown as a tower server, but chassis 105 may just as easily be a rack server.

Chassis 105 may include processor 110, memory 115, storage device 120, and BMC 125. Processor 110 may be any variety of processor: for example, an Intel Xeon, Celeron, Itanium, or Atom processor, an AMD Opteron processor, an ARM processor, etc. While FIG. 1 shows a single processor, chassis 105 may include any number of processors. Memory 115 may be any variety of memory, such as flash memory, Static Random Access Memory (SRAM), Persistent Random Access Memory, Ferroelectric Random Access Memory (FRAM), or Non-Volatile Random Access Memory (NVRAM), such as Magnetoresistive Random Access Memory (MRAM) etc., but is typically DRAM. Memory 115 may also be any desired combination of different memory types.

Storage device 120 may be any variety of storage device. Examples of such devices may include Solid State Drives (SSDs), but other storage forms, such as hard disk drives or other long-term storage devices, are also viable. BMC 125, as described above, may operate as a conventional BMC, but may also be self-configuring based on the configuration of chassis 105. For example, chassis 105 may be an NVMe chassis, or an NVMeoF chassis. With chassis 105 as an NVMe chassis, BMC 125 may operate as a conventional NVMe BMC after self-configuration. With chassis 105 as an NVMeoF chassis, BMC 125 may also operate as a conventional BMC, but it may also perform discovery of other devices within chassis 105, such as storage device 120, Network Interface Cards (NICs), and any other devices that may, like BMC 125, be subject to discovery.

While BMC 125 is described as being able to perform discovery of other devices in chassis 105, BMC 125 is one possible proxy for processor 110 performing the discovery. Other possible proxies may include a Redundant Array of Independent Disks (RAID) controller, another processor (typically different from processor 110, which would be involved in performing start-up operations), or even a software proxy. For the remainder of this document, any reference to BMC 125 is intended to also refer to these other proxy devices, as well as any other devices that may act as a proxy for processor 110.

FIG. 2 shows additional details of the chassis of FIG. 1. Referring to FIG. 2, typically, chassis 105 includes one or more processors 110, which may include memory controller 205 and clock 210, which may be used to coordinate the operations of the components of chassis 105. Processors 110 may also be coupled to memory 115, which may include random access memory (RAM), read-only memory (ROM), or other state preserving media, as examples. Processors 110 may also be coupled to storage devices 120, and to network connector 215, which may be, for example, an Ethernet connector or a wireless connector. Processors 110 may also be connected to a bus 220, to which may be attached user interface 225 and input/output interface ports that may be managed using input/output engine 230, among other components.

FIG. 3 shows BMC 125 of FIG. 1 communicating with devices on a mid-plane of chassis 105 of FIG. 1. In FIG. 3, BMC 125 and Complex Programmable Logic Device (CPLD) 305 may be situated on motherboard 310 within chassis 105 of FIG. 1. Chassis 105 of FIG. 1 may also include midplane 315. Midplane 315 may include other components, such as various Network-Attached SSDs 320, 325, and 330, which are examples of storage device 120 of FIG. 1. Network-Attached SSDs 320, 325, and 330 may support using any of a number of different transport protocols, such as Ethernet, Fibre Channel, InfiniBand, or Non-Volatile Memory Express (NVMe), to name a few possibilities, but in some embodiments of the inventive concept Network-Attached SSDs 320, 325, and/or 330 may be limited to a subset of these transport protocols (possibly one: for example, an Ethernet SSD). While FIG. 3 shows three Network-Attached SSDs 320, 325, and 330, embodiments of the inventive concept may support any desired number of devices. In addition, while FIG. 3 shows only Network-Attached SSDs 320, 325, and 330, other devices, such as Ethernet SSDs or NICs may be substituted for or included in addition to Network-Attached SSDs 320, 325, and 330. In the remainder of this document, any reference to Network-Attached SSDs 320, 325, and 330 is intended to encompass any alternative device that may be subject to discovery as an NVMeoF device and may be substituted for Network-Attached SSDs 320, 325, and 330.

BMC 125 may communicate with Network-Attached SSDs 320, 325, and 330 over I2C bus 335 and SMBus 340. Network-Attached SSDs 320, 325, and 330 may also communicate with EEPROM 345 and NVM 350. NVM 350 may act as memory 115 of FIG. 1; EEPROM 345 may store information for use by various devices in chassis 105 of FIG. 1. For example, EEPROM 345 may store VPD 355. VPD 355 may be used by Network-Attached SSDs 320, 325, and 330, and by BMC 125, to store information pertinent to those devices. More particularly, EEPROM 345 may store separate VPD 355 for each such device.

VPD 355 has several uses. In some embodiments of the inventive concept, VPD 355 may be used to store pertinent information for each device, which may be used in self-configuration. Thus, VPD 355 may store information used by Network-Attached SSDs 320, 325, and 330 to self-configure, as described in U.S. patent application Ser. No. 15/256,495, filed Sep. 2, 2016, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/366,622, filed Jul. 26, 2016, both of which are incorporated by reference herein for all purposes. But in other embodiments of the inventive concept, VPD 355 may also store information used by BMC 125 to perform its own self-configuration, as described below. In addition, in yet other embodiments of the inventive concept, Network-Attached SSDs 320, 325, and 330 may write information to VPD 355, which BMC 125 may then read. For example, Network-Attached SSDs 320, 325, and 330 may write their IP addresses to VPD 355, which BMC 125 may then read from VPD 355. Then, when host 110 of FIG. 1 queries BMC 125 for information, BMC 125 may provide the configuration information for Network-Attached SSDs 320, 325, and 330.

While FIG. 3 shows EEPROM 345 on midplane 315 and NVM 350 on motherboard 310, embodiments of the inventive concept may support these components (and other components as well) being placed anywhere desired. For example, in some embodiments of the inventive concept, EEPROM 345 and NVM 350 may both be located on midplane 315, in other embodiments of the inventive concept they may both be located on motherboard 310, and in yet other embodiments of the inventive concept NVM 350 may be on midplane 315 and EEPROM 345 on motherboard 310. Other embodiments of the inventive concept may place such components in yet other locations: for example, on another board within chassis 105 of FIG. 1, or possibly in another chassis entirely.

FIG. 4 shows details of BMC 125 of FIG. 1. In FIG. 4, BMC 125 is shown divided into two portions 405 and 410. Portion 405 relates to BMC 125 performing self-configuration in some embodiments of the inventive concept; portion 410 relates to BMC 125 acting as a proxy for host 110 of FIG. 1 in other embodiments of the inventive concept. Note that embodiments of the inventive concept may include one or both of portions 405 and 410, as desired.

To perform self-configuration, BMC 125 may include access logic 415, built-in self-configuration logic 420, and error reporting logic 425. Access logic 415 may access information about how BMC 125 is to configure itself. Access logic 415 is described further with reference to FIG. 5 below. Built-in self-configuration logic 420 may configure BMC 125 to use the appropriate driver based on the configuration of chassis 105 of FIG. 1. Built-in self-configuration logic 420 is described further with reference to FIG. 8 below. Error reporting logic 425 may report an error to host 110 of FIG. 1 when there is a problem. Examples of problems that BMC 125 might report to host 110 of FIG. 1 may include when chassis 105 of FIG. 1 is a High Availability chassis but BMC 125 may not access or load a High Availability driver, or when BMC 125 may not communicate with its pairing partner as a High Availability system.

To act as a discovery proxy for host 110 of FIG. 1, BMC 125 may include device communication logic 430, Log Page creation logic 435, reception logic 440, and transmission logic 445. Device communication logic 430 may enable BMC 125 to communicate with devices, such as Network-Attached SSDs 320, 325, and 330 of FIG. 3, to learn about their configuration. Device communication logic 430 is described further with reference to FIG. 10 below. Log Page creation logic 435 may take the information received from Ethernet devices 320, 325, and 330 of FIG. 3, and create a Discovery Log Page, that may be reported to host 110 of FIG. 1 at an appropriate time. Log Page creation logic 435 may either simply collate the information received from Ethernet devices 320, 325, and 330 of FIG. 3, or it may eliminate repeated information from Network-Attached SSDs 320, 325, and 330 of FIG. 3 by assembling the Log Page. The structure of a Log Page is described in the NVM Express over Fabrics specification, revision 1.0, dated Jun. 5, 2016, which is hereby incorporated by reference for all purposes.

In some embodiments of the inventive concept, BMC 125 may have its own storage: for example, in NVM 350 of FIG. 3, or in EEPROM 345 of FIG. 3 among other possibilities. Network-Attached SSDs 320, 325, and 330 of FIG. 3 may write their configuration information directly into a Log Page maintained in this storage for BMC 125.

Reception logic 440 and transmission logic 445 enable communication with host 110 of FIG. 1. For example, reception logic 440 may receive a query from host 110 of FIG. 1 regarding Network-Attached SSDs 320, 325, and 330 of FIG. 3; transmission logic 445 may send a response back to host 110 of FIG. 1 responsive to such a query. Note that reception logic 440 and transmission logic 445 are not required to be dedicated to the purposes described above: they may be used for other purposes as well. For example, as described below with reference to FIG. 10, device communication logic 430 may send messages to Network-Attached SSDs 320, 325, and 330 of FIG. 3: these messages may be sent using transmission logic 445 (and responses to these messages may be received using reception logic 440).

FIG. 5 shows details of access logic 415 of FIG. 4. In FIG. 5, access logic 415 may include VPD reading logic 505 and pin reading logic 510. VPD reading logic 505 may read information from VPD 355 of FIG. 3, which may be a VPD specific to BMC 125. The information in VPD 355 of FIG. 3 may include the configuration of chassis 105 of FIG. 1. Pin reading logic 510, on the other hand, may determine the configuration of chassis 105 of FIG. 1 by reading one or more signals on one or more pins of BMC 125 of FIG. 1. These pins of BMC 125 of FIG. 1 may be dedicated to specifying the configuration of chassis 105 of FIG. 1.

FIG. 6 shows an example of BMC 125 of FIG. 1 with pins for signaling. In FIG. 6, BMC 515 is shown as including a variety of pins. Pins 605 and 610 may be used to specify the configuration of chassis 105 of FIG. 1: based on the values signaled on these pins, BMC 125 may determine the configuration of chassis 105 of FIG. 1. Pins 605 and 610 may be general purpose input/output (GPIO) pins, among other possibilities.

Returning to FIG. 5, pin reading logic 510 may use the information read from pins 605 and 610 of FIG. 6 to determine the configuration of chassis 105 of FIG. 1 and load the appropriate driver. For example, as described below with reference to FIG. 8, there may be three different configurations of chassis 105 of FIG. 1: NVMe, NVMeoF, and High Availability. To choose between three different possibilities may require two bits, which could require signals to be sent on two pins. If the two pins specify the value 00, that combination may specify that chassis 105 of FIG. 1 is an NVMe chassis. If the two pins specify the value 01, that combination may specify that chassis 105 of FIG. 1 is an NVMeoF chassis. And if the two pins specify the value 10, that combination may specify that chassis 105 of FIG. 1 is a High Availability chassis.

Alternatively, three possibilities could be managed by a single pin. For example, a 0 value could specify an NVMe chassis, a 1 value could specify an NVMeoF chassis, and an oscillation between 0 and 1 could specify a High Availability chassis. But if there are more than three combinations, it is likely that more than one pin would be needed to specify the chassis configuration.

While the above example describes three possibilities—NVMe, NVMeoF, and High Availability—in other embodiments of the inventive concept there may be four driver configurations—NVMe, NVMeoF, NVMe High Availability, and NVMeoF High Availability. In such an embodiment of the inventive concept, for example, a high value on pin 605 may indicate that chassis 105 of FIG. 1 is a High Availability chassis and a low value on pin 605 may indicate that chassis 105 of FIG. 1 is not a High Availability chassis, whereas a high value on pin 610 may indicate that chassis 105 of FIG. 1 uses NVMeoF and a low value on pin 610 may indicate that chassis 105 of FIG. 1 uses NVMe. And in yet other embodiments of the inventive concept there may be even more different driver types. Embodiments of the inventive concept are may encompass any number of driver types as desired.

In FIG. 5, VPD reading logic 505 and pin reading logic 510 represent alternative ways for BMC 125 of FIG. 1 to determine the configuration of chassis 105 of FIG. 1. Thus, access logic 415 might include one or the other, and not necessarily both. However, embodiments of the inventive concept could include both VPD reading logic 505 and pin reading logic 510, to support BMC 125 of FIG. 1 being able to determine the configuration of chassis 105 of FIG. 1 in different ways.

High Availability chassis have now been mentioned a couple of times. FIG. 7 shows chassis 105 of FIG. 1 in a High Availability configuration. Processor 110 and BMC 125 may be paired with another processor 705 and another BMC 710. In some embodiments of the inventive concept, processor 705 may be in chassis 105 of FIG. 1, and in other embodiments of the inventive concept processor 705 may be in a different chassis. Processor 110 may maintain communication with processor 705, and BMC 125 may maintain communication with BMC 710. This communication may include a heartbeat: if one of BMC 125 and BMC 710 do not respond, then the other BMC knows that there is an error. Pairing partners may communicate, for example, over Peripheral Component Interconnect Express (PCIe) or Ethernet, among other possibilities.

If a pairing partner fails—for example, one of the chassis loses power—the remaining processor may enable the take-over path, permitting the remaining BMC to establish communication and cross the domain. Since the BMC in the failed chassis may run on standby power, the surviving processor may talk to the BMC of the failed chassis. The surviving processor may try to reset the failed processor, in the hopes that the failed processor may be restarted. If the failed processor may not be reset, the surviving processor may send an alert or interrupt to the host that oversees the failed chassis. A third party software or agent may then elect an available working node to become the new pairing partner of the surviving node.

Because of the need for heartbeat communication and for the surviving node to take over for the failed node, the driver needed for a High Availability chassis is different from the driver used in a non-High Availability chassis. Thus, BMC 125 operates differently in a High Availability chassis than in a non-High Availability chassis.

Until the High Availability driver is loaded into BMC 125, it might happen that BMC 125 may not see its pairing partner. Thus, in some embodiments of the inventive concept, the High Availability driver should be loaded even though BMC 125 might not yet be able to communicate with its pairing partner, and checking for the pairing partner should occur after the High Availability driver is loaded.

FIG. 8 shows built-in self-configuration logic 420 of FIG. 4. As described above, built-in self-configuration logic 420 may take the information determined by access logic 415 of FIG. 4 and configure BMC 125 of FIG. 1 accordingly. Built-in self-configuration logic 420 may include driver downloader 805 and driver loader 810. Driver downloader 805 may download an appropriate driver, such as NVMe driver 815, NVMeoF driver 820, and High Availability driver 825 from a driver source. Note that the driver source might be within the firmware of BMC 125 of FIG. 1, in which case the driver does not need to be “downloaded” at all, but rather just read from the firmware. Once downloaded or otherwise located, driver loader 810 may then load the selected driver into BMC 125.

FIG. 9 shows various sources for the drivers of FIG. 8. In FIG. 9, chassis 105 may include EEPROM 345, which may be a driver source. In such embodiments of the inventive concept, the appropriate driver may be stored in EEPROM 345 and read from there as needed.

Chassis 105 is also shown as connected to network 905. Network 905 may permit communication between chassis 105 and machines 910 and 915. Machine 910 may be a machine on a Local Area Network (LAN), whereas machine 915 may be a machine on a global network, such as the Internet. Regardless of what source exists for the selected driver, however, driver downloader 805 of FIG. 8 may download (or read) the appropriate driver from the driver source, enabling driver loader 810 of FIG. 8 to then load the driver into BMC 125 of FIG. 1.

FIG. 10 shows device communication logic 430 of FIG. 4. In FIG. 10, device communication logic 430 may include read logic 1005 and polling logic 1010. BMC 125 of FIG. 1 may use read logic 1005 to read information, such as the configuration of one of Network-Attached SSDs 320, 325, and 330 of FIG. 3, from VPD 355 of FIG. 3. BMC 125 may also use read logic 1005 to read new information from VPD 355, if Network-Attached SSDs 320, 325, and 330 send a message to BMC 125 of FIG. 1 indicating that new information is available.

In contrast, BMC 125 of FIG. 1 may using polling logic 1010 to poll Network-Attached SSDs 320, 325, and 330 of FIG. 3 periodically. In embodiments of the invention where Network-Attached SSDs 320, 325, and 330 of FIG. 3 do not notify BMC 125 of FIG. 1 about changes in their configuration, BMC 125 of FIG. 1 may use polling logic 1010 to query Network-Attached SSDs 320, 325, and 330 about their current information, and whether any information has changed. Network-Attached SSDs 320, 325, and 330 may then reply, indicating whether their configurations have changed and, if so, how they have changed.

FIG. 11 shows host 110 of FIG. 1 requesting a Discovery Log Page from BMC 125 of FIG. 1. In FIG. 11, host 110 may send query 1105 to BMC 125. Typically, query 1105 is sent when host 110 is ready to receive the configuration information of BMC 125, which may be some interval of time after BMC 125 has collected and assembled the configuration information for Network-Attached SSDs 320, 325, and 330. BMC 125 may then respond by with response 1110, which may include Log Page 1115. In this manner, BMC 125 may provide host 110 with information about all the devices installed in chassis 105, or at least, all the devices in the domain of the BMC. 125. For example, a single chassis 105 of FIG. 1 might have two motherboards (either two half-width motherboards or two stacked full-width motherboards, for example), each with its own BMC and attached devices. In such a scenario, each BMC is responsible for collecting the information about the devices in its domain, but not for collecting the information about the devices in the other BMC's domain, even though they are all within the same chassis.

Embodiments of the inventive concept have a technical advantage over conventional systems in that they may expedite the process of starting the machine. In conventional systems, the host must query each device in turn for its configuration information, but it may not do so until after it has done a number of other start-up operations. The BMC, in contrast, may start up much more quickly, and may act as a proxy for the host, querying the various devices for their configuration (while the host is busy performing other start-up procedures). Then, when the host is ready, the host may query the BMC for the configuration information, and may learn about all attached devices much more quickly. In addition, as compared with conventional Discovery Services performed using the data plane, performing discovery services via BMC 125 on the control plane is more secure and does not consume any bandwidth on the data plane.

Another technical advantage that embodiments of the inventive concept have over conventional systems is that the host only needs to issue one command to the BMC to perform discovery of all devices present in the chassis. For example, if the chassis includes 24 devices, the host may issue a “discovery all devices” command to the BMC: the BMC may discover the 24 devices. This approach avoids the host issuing 24 discovery commands to the 24 devices, as in the conventional system.

FIGS. 12A-12D show a flowchart of an example procedure for BMC 125 of FIG. 1 to self-configure, according to an embodiment of the inventive concept. In FIG. 12A, at block 1203, access logic 415 of FIG. 4 may determine a configuration of chassis 105 of FIG. 1: NVMe, NVMeoF, or High Availability. At block 1206, BMC 125 of FIG. 1 may determine if chassis 105 of FIG. 1 is a High Availability chassis (which may include multiple flavors, such as NVMe or NVMeoF). If chassis 105 of FIG. 1 is not a High Availability chassis, then processing may continue at block 1236 (FIG. 12C).

Continuing with FIG. 12A, if chassis 105 of FIG. 1 is a High Availability chassis, then at block 1209 built-in self-configuration logic 420 of FIG. 4 may select High Availability driver 825 of FIG. 8. At block 1212, built-in self-configuration logic 420 of FIG. 4 may determine if High Availability driver 825 of FIG. 8 is available. If not, then at block 1215, error reporting logic 425 of FIG. 4 may report an error.

If High Availability driver 825 of FIG. 8 is available, then at block 1218 (FIG. 12B) driver downloader 805 of FIG. 8 may download High Availability driver 825 of FIG. 8, and at block 1221 driver loader 810 of FIG. 8 may load High Availability driver 825 of FIG. 8.

At block 1224, BMC 125 of FIG. 1 may attempt to communicate with its pairing partner (BMC 710 of FIG. 7). At block 1227, BMC 125 of FIG. 1 may determine if its pairing partner is available. If the pairing partner of BMC 125 of FIG. 1 is available, then at block 1230, BMC 125 of FIG. 1 may determine whether the devices installed in chassis 105 of FIG. 1 are dual-path devices. If BMC 125 of FIG. 1 may not determine that its pairing partner is available (block 1227) or the devices installed in chassis 105 of FIG. 1 are not dual-path devices (block 1230), then at block 1233 BMC 125 of FIG. 1 may report that it is not operating as a High Availability device.

Regardless of whether chassis 105 of FIG. 1 is operating as a High Availability device (in blocks 1227, 1230, and 1233) or not (in block 1206), at block 1236, BMC 125 of FIG. 1 may determine if the configuration of chassis 105 of FIG. 1 is an NVMeoF chassis. If so, then at block 1239, BMC 125 of FIG. 1 may select NVMeoF driver 820 of FIG. 8, at block 1242 driver downloader 805 of FIG. 8 may download the NVMeoF driver 820 of FIG. 8, and at block 1245 driver loader 810 of FIG. 8 may load the NVMeoF driver 820 of FIG. 8. Additionally, at block 1248, BMC 125 of FIG. 1 may collect information about other devices installed in chassis 105 of FIG. 1, thereby acting as a proxy for host 110 of FIG. 1.

If chassis 105 of FIG. 1 is not an NVMeoF chassis, then at block 1251 (FIG. 12D), BMC 125 of FIG. 1 may determine if the configuration of chassis 105 of FIG. 1 is an NVMe chassis. If so, then at block 1254, BMC 125 of FIG. 1 may select NVMeoF driver 820 of FIG. 8, at block 1257 driver downloader 805 of FIG. 8 may download NVMe driver 815 of FIG. 8, and at block 1260 driver loader 810 of FIG. 8 may load NVMe driver 815 of FIG. 8, after which processing ends. If chassis 105 of FIG. 1 is not an NVMe chassis at block 1251, then control may return to block 1215 to report an error.

FIGS. 12A-12D show an example embodiment of the inventive concept. In other embodiments of the inventive concept, there may be more than two chassis configurations. And in yet other embodiments of the inventive concept, BMC 125 of FIG. 1 may use an NVMe driver as a default when no other driver may be loaded. Other variations on FIGS. 12A-12D are also possible.

FIG. 13 shows a flowchart of an example procedure for access logic 415 of FIG. 4 to determine the configuration of the chassis of FIG. 1. In FIG. 13, at block 1305, VPD reading logic 505 of FIG. 5 may read the configuration of chassis 105 of FIG. 1 from VPD 355 of FIG. 3. Alternatively, at block 1310, pin reading logic 510 may read the configuration of chassis 105 of FIG. 1 from signals sent on one or more pins 605 and 610 of FIG. 6 on BMC 125 of FIG. 1.

FIG. 14 shows a flowchart of an example procedure for BMC 125 of FIG. 1 to perform discovery of NVM devices in chassis 105 of FIG. 1, according to an embodiment of the inventive concept. In FIG. 14, at block 1405, BMC 125 may receive data about the configuration of Network-Attached SSDs 320, 325, and 330 of FIG. 3. Block 1405 may be repeated as often as necessary for all devices, as shown by dashed arrow 1410. At block 1415, BMC 125 of FIG. 1 may compile a record (such as Log Page 1115 of FIG. 11) from the information received from Network-Attached SSDs 320, 325, and 330 of FIG. 3. At block 1420, host 110 of FIG. 1 may send, and BMC 125 of FIG. 1 may receive, a request for the configurations about Network-Attached SSDs 320, 325, and 330 of FIG. 3. At block 1425, BMC 125 of FIG. 1 may send to host 110 of FIG. 1 the record of the device configurations.

FIG. 15 shows a flowchart of an example procedure for device communication logic 430 of FIG. 4 to obtain discovery information about NVM devices 320, 325, and 330 of FIG. 3 in chassis 105 of FIG. 1. In FIG. 15, at block 1505, read logic 1005 of FIG. 10 may read configuration data about a device from VPD 355 of FIG. 3. Alternatively, at block 1510, polling logic 1010 of FIG. 10 may poll the device for its configuration data, at block 1515 BMC 125 of FIG. 1 may receive the configuration data from the device.

FIG. 16 shows a flowchart of an example procedure for BMC 125 of FIG. 1 to build a record of the device(s) configurations. In FIG. 16, at block 1605, BMC 125 of FIG. 1 may simply compile the collected information from VPD 355 for the various devices into a record. Alternatively, at block 1610, Log Page creation logic 435 of FIG. 4 may create Log Page 1115 of FIG. 11 from the collected device(s) configurations.

FIG. 17 shows a flowchart of an example procedure for an NVM device in chassis 105 of FIG. 1 to inform BMC 125 of FIG. 1 about a change in the configuration of the NVM device, according to an embodiment of the inventive concept. In FIG. 17, at block 1705, the device—for example, Network-Attached SSDs 320, 325, and/or 330 of FIG. 3—may determine that its configuration has changed. At block 1710, the device may write the change to VPD 355, and at block 1715 the device may notify a proxy device—such as BMC 125 of FIG. 1—that the change was written to VPD 355. Alternatively, at block 1720, the device may wait until it receives a query from the proxy device about the device's current configuration, at which time (in block 1725) the device may send its current configuration to the proxy device.

In FIGS. 12A-17, some embodiments of the inventive concept are shown. But a person skilled in the art will recognize that other embodiments of the inventive concept are also possible, by changing the order of the blocks, by omitting blocks, or by including links not shown in the drawings. All such variations of the flowcharts are considered to be embodiments of the inventive concept, whether expressly described or not.

The following discussion is intended to provide a brief, general description of a suitable machine or machines in which certain aspects of the inventive concept may be implemented. The machine or machines may be controlled, at least in part, by input from conventional input devices, such as keyboards, mice, etc., as well as by directives received from another machine, interaction with a virtual reality (VR) environment, biometric feedback, or other input signal. As used herein, the term “machine” is intended to broadly encompass a single machine, a virtual machine, or a system of communicatively coupled machines, virtual machines, or devices operating together. Exemplary machines include computing devices such as personal computers, workstations, servers, portable computers, handheld devices, telephones, tablets, etc., as well as transportation devices, such as private or public transportation, e.g., automobiles, trains, cabs, etc.

The machine or machines may include embedded controllers, such as programmable or non-programmable logic devices or arrays, Application Specific Integrated Circuits (ASICs), embedded computers, smart cards, and the like. The machine or machines may utilize one or more connections to one or more remote machines, such as through a network interface, modem, or other communicative coupling. Machines may be interconnected by way of a physical and/or logical network, such as an intranet, the Internet, local area networks, wide area networks, etc. One skilled in the art will appreciate that network communication may utilize various wired and/or wireless short range or long range carriers and protocols, including radio frequency (RF), satellite, microwave, Institute of Electrical and Electronics Engineers (IEEE) 802.11, Bluetooth®, optical, infrared, cable, laser, etc.

Embodiments of the present inventive concept may be described by reference to or in conjunction with associated data including functions, procedures, data structures, application programs, etc. which when accessed by a machine results in the machine performing tasks or defining abstract data types or low-level hardware contexts. Associated data may be stored in, for example, the volatile and/or non-volatile memory, e.g., RAM, ROM, etc., or in other storage devices and their associated storage media, including hard-drives, floppy-disks, optical storage, tapes, flash memory, memory sticks, digital video disks, biological storage, etc. Associated data may be delivered over transmission environments, including the physical and/or logical network, in the form of packets, serial data, parallel data, propagated signals, etc., and may be used in a compressed or encrypted format. Associated data may be used in a distributed environment, and stored locally and/or remotely for machine access.

Embodiments of the inventive concept may include a tangible, non-transitory machine-readable medium comprising instructions executable by one or more processors, the instructions comprising instructions to perform the elements of the inventive concepts as described herein.

Having described and illustrated the principles of the inventive concept with reference to illustrated embodiments, it will be recognized that the illustrated embodiments may be modified in arrangement and detail without departing from such principles, and may be combined in any desired manner. And, although the foregoing discussion has focused on particular embodiments, other configurations are contemplated. In particular, even though expressions such as “according to an embodiment of the inventive concept” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the inventive concept to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments.

The foregoing illustrative embodiments are not to be construed as limiting the inventive concept thereof. Although a few embodiments have been described, those skilled in the art will readily appreciate that many modifications are possible to those embodiments without materially departing from the novel teachings and advantages of the present disclosure. Accordingly, all such modifications are intended to be included within the scope of this inventive concept as defined in the claims.

Embodiments of the inventive concept may extend to the following statements, without limitation:

Statement 1. An embodiment of the inventive concept includes a Baseboard Management Controller (BMC), comprising:

an access logic to determine a configuration of a chassis; and

a built-in self-configuration logic to configure the BMC responsive to the configuration of the chassis,

wherein the BMC may self-configure without using any BIOS, device drivers, or operating systems.

Statement 2. An embodiment of the inventive concept includes a BMC according to statement 1, wherein the built-in self-configuration logic is operative to configure the BMC to use either a Non-Volatile Memory Express (NVMe) driver or a Non-Volatile Memory Express Over Fabric (NVMeoF) driver responsive to the configuration for the BMC.

Statement 3. An embodiment of the inventive concept includes a BMC according to statement 2, wherein using the NVMeoF driver enables the BMC to determine the configuration of at least one device in a chassis including the BMC.

Statement 4. An embodiment of the inventive concept includes a BMC according to statement 2, wherein the access logic includes a Vital Product Data (VPD) reading logic to read the configuration of the chassis from a VPD.

Statement 5. An embodiment of the inventive concept includes a BMC according to statement 4, wherein the VPD is stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

Statement 6. An embodiment of the inventive concept includes a BMC according to statement 2, wherein the access logic includes a pin reading logic to determine the configuration of the chassis from a signal on at least one pin on the BMC.

Statement 7. An embodiment of the inventive concept includes a BMC according to statement 2, wherein the built-in self-configuration logic includes a driver loader to load the NVMe driver or the NVMeoF driver responsive to the configuration of the chassis.

Statement 8. An embodiment of the inventive concept includes a BMC according to statement 7, wherein the built-in self-configuration logic further includes a driver downloader to download the NVMe driver or the NVMeoF driver from a driver source.

Statement 9. An embodiment of the inventive concept includes a BMC according to statement 8, wherein the driver source is drawn from a set including storage in an EEPROM, a first site on a local computer network, and a second site on a global computer network.

Statement 10. An embodiment of the inventive concept includes a BMC according to statement 2, wherein the access logic is operative to determine whether the configuration of the chassis includes a High Availability (HA) chassis.

Statement 11. An embodiment of the inventive concept includes a BMC according to statement 10, wherein the built-in self-configuration logic is operative to load an HA driver.

Statement 12. An embodiment of the inventive concept includes a BMC according to statement 11, wherein the built-in self-configuration logic is operative to load the HA driver before the BMC has determined whether a pairing partner is available.

Statement 13. An embodiment of the inventive concept includes a BMC according to statement 11, further comprising an error reporting logic to report an error if the HA driver is not available.

Statement 14. An embodiment of the inventive concept includes a BMC according to statement 10, further comprising an error reporting logic to report an error if the BMC may not communicate with a pairing partner.

Statement 15. An embodiment of the inventive concept includes a method, comprising:

determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC;

selecting a driver responsive to the configuration of the chassis; and

loading the selected driver,

wherein the BMC may self-configure without using any BIOS, device drivers, or operating systems.

Statement 16. An embodiment of the inventive concept includes a method according to statement 15, wherein:

the configuration of chassis is drawn from a set including a Non-Volatile Memory Express (NVMe) chassis and a Non-Volatile Memory Express Over Fabric (NVMeoF) chassis; and

selecting a driver responsive to the configuration of the chassis includes selecting one of an NVMe driver and an NVMeoF driver for the BMC according to the configuration of the chassis.

Statement 17. An embodiment of the inventive concept includes a method according to statement 16, wherein:

determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC includes determining by the BMC that the configuration of the chassis is the NVMeoF chassis; and

the method further comprises determining, by the BMC, the configuration of at least one device in the chassis including the BMC.

Statement 18. An embodiment of the inventive concept includes a method according to statement 16, wherein determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC includes reading the configuration of the chassis from a Vital Product Data (VPD).

Statement 19. An embodiment of the inventive concept includes a method according to statement 18, wherein the VPD is stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

Statement 20. An embodiment of the inventive concept includes a method according to statement 16, wherein determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC includes accessing a signal from at least one pin on the BMC to determine the configuration of the chassis.

Statement 21. An embodiment of the inventive concept includes a method according to statement 16, further comprising downloading the selected driver from a driver source.

Statement 22. An embodiment of the inventive concept includes a method according to statement 21, wherein the driver source is drawn from a set including storage in an EEPROM, a first site on a local computer network, and a second site on a global computer network.

Statement 23. An embodiment of the inventive concept includes a method according to statement 16, wherein determining by a Baseboard Management Controller (BMC) a configuration of a chassis includes determining by the BMC that the configuration of the chassis is a High Availability (HA) chassis.

Statement 24. An embodiment of the inventive concept includes a method according to statement 23, wherein selecting a driver for the BMC according to the configuration of the chassis includes selecting an HA driver.

Statement 25. An embodiment of the inventive concept includes a method according to statement 24, further comprising reporting an error if the HA driver is not available.

Statement 26. An embodiment of the inventive concept includes a method according to statement 24, further comprising attempting to communicate with a pairing partner for the BMC.

Statement 27. An embodiment of the inventive concept includes a method according to statement 26, further comprising reporting an error if the BMC may not communicate with the pairing partner.

Statement 28. An embodiment of the inventive concept includes a method according to statement 26, wherein attempting to communicate with a pairing partner for the BMC includes attempting to communicate with the pairing partner for the BMC after loading the HA driver.

Statement 29. An embodiment of the inventive concept includes article, comprising a tangible storage medium, the tangible storage medium having stored thereon non-transitory instructions that, when executed by a machine, result in:

determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC;

selecting a driver responsive to the configuration of the chassis; and

loading the selected driver,

wherein the BMC may self-configure without using any BIOS, device drivers, or operating systems.

Statement 30. An embodiment of the inventive concept includes an article according to statement 29, wherein:

the configuration of chassis is drawn from a set including a Non-Volatile Memory Express (NVMe) chassis and a Non-Volatile Memory Express Over Fabric (NVMeoF) chassis;

selecting a driver responsive to the configuration of the chassis includes selecting one of an NVMe driver and an NVMeoF driver for the BMC according to the configuration of the chassis.

Statement 31. An embodiment of the inventive concept includes an article according to statement 30, wherein:

determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC includes determining by the BMC that the configuration of the chassis is the NVMeoF chassis; and

the tangible storage medium having stored thereon further non-transitory instructions that, when executed by the machine, result in determining, by the BMC, the configuration of at least one device in the chassis including the BMC.

Statement 32. An embodiment of the inventive concept includes an article according to statement 30, wherein determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC includes reading the configuration of the chassis from a Vital Product Data (VPD).

Statement 33. An embodiment of the inventive concept includes an article according to statement 32, wherein the VPD is stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

Statement 34. An embodiment of the inventive concept includes an article according to statement 30, wherein determining by a Baseboard Management Controller (BMC) a configuration of a chassis including the BMC includes accessing a signal from at least one pin on the BMC to determine the configuration of the chassis.

Statement 35. An embodiment of the inventive concept includes an article according to statement 30, the tangible storage medium having stored thereon further non-transitory instructions that, when executed by the machine, result in downloading the selected driver from a driver source.

Statement 36. An embodiment of the inventive concept includes an article according to statement 35, wherein the driver source is drawn from a set including storage in an EEPROM, a first site on a local computer network, and a second site on a global computer network.

Statement 37. An embodiment of the inventive concept includes an article according to statement 30, wherein determining by a Baseboard Management Controller (BMC) a configuration of a chassis includes determining by the BMC that the the chassis is a High Availability (HA) chassis.

Statement 38. An embodiment of the inventive concept includes an article according to statement 37, wherein selecting a driver for the BMC according to the configuration of the chassis includes selecting an HA driver.

Statement 39. An embodiment of the inventive concept includes an article according to statement 38, the tangible storage medium having stored thereon further non-transitory instructions that, when executed by the machine, result in reporting an error if the HA driver is not available.

Statement 40. An embodiment of the inventive concept includes an article according to statement 38, the tangible storage medium having stored thereon further non-transitory instructions that, when executed by the machine, result in attempting to communicate with a pairing partner for the BMC.

Statement 41. An embodiment of the inventive concept includes an article according to statement 40, the tangible storage medium having stored thereon further non-transitory instructions that, when executed by the machine, result in reporting an error if the BMC may not communicate with the pairing partner.

Statement 42. An embodiment of the inventive concept includes an article according to statement 40, wherein attempting to communicate with a pairing partner for the BMC includes attempting to communicate with the pairing partner for the BMC after loading the HA driver.

Statement 43. An embodiment of the inventive concept includes a proxy device in a chassis, comprising:

a device communication logic to communicate with at least one device over a control plane about data regarding the at least one device;

a reception logic to receive a query from a host, the query requesting information about the at least one device; and

a transmission logic to send a response to the host, the response including data about the at least one device.

Statement 44. An embodiment of the inventive concept includes a proxy device according to statement 43, wherein the proxy device is drawn from a set including a Baseboard Management Controller (BMC), a Redundant Array of Independent Disks (RAID) controller, and a processor.

Statement 45. An embodiment of the inventive concept includes a proxy device according to statement 43, wherein the at least one device is drawn from a set including a storage device and a Network Interface Card (NIC).

Statement 46. An embodiment of the inventive concept includes a proxy device according to statement 43, wherein the device communication logic includes a read logic to read the data regarding the at least one device from a Vital Product Data for the at least one device.

Statement 47. An embodiment of the inventive concept includes a proxy device according to statement 46, wherein the Vital Product Data is stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

Statement 48. An embodiment of the inventive concept includes a proxy device according to statement 43, wherein:

the device communication logic includes a polling logic to poll the at least one device for the data regarding the at least one device; and

the reception logic is operative to receive the data regarding the at least one device from the at least one device.

Statement 49. An embodiment of the inventive concept includes a proxy device according to statement 43, wherein the chassis includes permanent storage associated with the proxy device in which the proxy device may create a Log Page from the data regarding the at least one device.

Statement 50. An embodiment of the inventive concept includes a proxy device according to statement 49, further comprising a Log Page creation logic to create a Log Page from the data about the at least one device.

Statement 51. An embodiment of the inventive concept includes a proxy device according to statement 49, wherein the transmission logic is operative to send the Log Page to the host responsive to the query.

Statement 52. An embodiment of the inventive concept includes a method, comprising:

receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device, the data from the at least one device received over a control plane;

compiling the at least one data into a record;

receiving, at the proxy device, a query from a host for the configurations of the at least one device; and

sending the record from the proxy device to the host,

wherein the proxy device may receive the at least one data from the at least one device and compile the at least one data into a record before receiving the query from the host.

Statement 53. An embodiment of the inventive concept includes a method according to statement 52, wherein the proxy device is drawn from a set including a Baseboard Management Controller (BMC), a Redundant Array of Independent Disks (RAID) controller, a processor, or a software proxy device.

Statement 54. An embodiment of the inventive concept includes a method according to statement 52, wherein the at least one device is drawn from a set including a storage device and a Network Interface Card (NIC).

Statement 55. An embodiment of the inventive concept includes a method according to statement 52, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes receiving, at the proxy device, the at least one data from the at least one device about configurations of the at least one device along a control plane.

Statement 56. An embodiment of the inventive concept includes a method according to statement 52, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes polling the at least one device for the configurations of the at least one device.

Statement 57. An embodiment of the inventive concept includes a method according to statement 52, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes receiving a datum from one of the at least one device when a configuration of the one of the at least one device changes.

Statement 58. An embodiment of the inventive concept includes a method according to statement 52, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes reading the at least one data from at least one Vital Product Data.

Statement 59. An embodiment of the inventive concept includes a method according to statement 58, wherein the at least one Vital Product Data are stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

Statement 60. An embodiment of the inventive concept includes a method according to statement 52, wherein compiling the at least one data into a record includes creating a Log Page from the at least one data.

Statement 61. An embodiment of the inventive concept includes a method according to statement 60, wherein sending the configurations of the at least one device from the proxy device to the host includes sending the Log Page from the proxy device to the host.

Statement 62. An embodiment of the inventive concept includes a method according to statement 52, wherein sending the configurations of the at least one device from the proxy device to the host includes sending the at least one data from the proxy device to the host.

Statement 63. An embodiment of the inventive concept includes a method, comprising:

determining, by a device, a change in a configuration of the device; and

notifying a proxy device over a control plane about the change in the configuration of the device.

Statement 64. An embodiment of the inventive concept includes a method according to statement 63, wherein the proxy device is drawn from a set including a Baseboard Management Controller (BMC), a Redundant Array of Independent Disks (RAID) controller, a processor, or a software proxy device.

Statement 65. An embodiment of the inventive concept includes a method according to statement 63, wherein the at least one device is drawn from a set including a storage device and a Network Interface Card (NIC).

Statement 66. An embodiment of the inventive concept includes a method according to statement 63, wherein notifying a proxy device about the change in the configuration of the device includes writing the change in the configuration of the device to a Vital Product Data that may be read by the proxy device.

Statement 67. An embodiment of the inventive concept includes a method according to statement 66, wherein notifying a proxy device about the change in the configuration of the device further includes notifying the proxy device that the change in the configuration of the device was written to the Vital Product Data.

Statement 68. An embodiment of the inventive concept includes a method according to statement 63, wherein notifying a proxy device about the change in the configuration of the device includes:

receiving a query from the proxy device about a current status of the configuration of the device; and

sending a response to the proxy device including the change in the configuration of the device.

Statement 69. An embodiment of the inventive concept includes an embodiment of the inventive concept includes an article, comprising a tangible storage medium, the tangible storage medium having stored thereon non-transitory instructions that, when executed by a machine, result in:

receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device, the data from the at least one device received over a control plane;

compiling the at least one data into a record;

receiving, at the proxy device, a query from a host for the configurations of the at least one device; and

sending the record from the proxy device to the host,

wherein the proxy device may receive the at least one data from the at least one device and compile the at least one data into a record before receiving the query from the host.

Statement 70. An embodiment of the inventive concept includes an article according to statement 69, wherein the proxy device is drawn from a set including a Baseboard Management Controller (BMC), a Redundant Array of Independent Disks (RAID) controller, a processor, or a software proxy device.

Statement 71. An embodiment of the inventive concept includes an article according to statement 69, wherein the at least one device is drawn from a set including a storage device and a Network Interface Card (NIC).

Statement 72. An embodiment of the inventive concept includes an article according to statement 69, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes receiving, at the proxy device, the at least one data from the at least one device about configurations of the at least one device along a control plane.

Statement 73. An embodiment of the inventive concept includes an article according to statement 69, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes polling the at least one device for the configurations of the at least one device.

Statement 74. An embodiment of the inventive concept includes an article according to statement 69, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes receiving a datum from one of the at least one device when a configuration of the one of the at least one device changes.

Statement 75. An embodiment of the inventive concept includes an article according to statement 69, wherein receiving, at a proxy device, at least one data from at least one device about configurations of the at least one device includes reading the at least one data from at least one Vital Product Data.

Statement 76. An embodiment of the inventive concept includes an article according to statement 75, wherein the at least one Vital Product Data are stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

Statement 77. An embodiment of the inventive concept includes an article according to statement 69, wherein compiling the at least one data into a record includes creating a Log Page from the at least one data.

Statement 78. An embodiment of the inventive concept includes an article according to statement 77, wherein sending the configurations of the at least one device from the proxy device to the host includes sending the Log Page from the proxy device to the host.

Statement 79. An embodiment of the inventive concept includes an article according to statement 69, wherein sending the configurations of the at least one device from the proxy device to the host includes sending the at least one data from the proxy device to the host.

Statement 80. An embodiment of the inventive concept includes an embodiment of the inventive concept includes an article, comprising a tangible storage medium, the tangible storage medium having stored thereon non-transitory instructions that, when executed by a machine, result in:

determining, by a device, a change in a configuration of the device; and

notifying a proxy device over a control plane about the change in the configuration of the device.

Statement 81. An embodiment of the inventive concept includes an article according to statement 80, wherein the proxy device is drawn from a set including a Baseboard Management Controller (BMC), a Redundant Array of Independent Disks (RAID) controller, a processor, or a software proxy device.

Statement 82. An embodiment of the inventive concept includes an article according to statement 80, wherein the at least one device is drawn from a set including a storage device and a Network Interface Card (NIC).

Statement 83. An embodiment of the inventive concept includes an article according to statement 80, wherein notifying a proxy device about the change in the configuration of the device includes writing the change in the configuration of the device to a Vital Product Data that may be read by the proxy device.

Statement 84. An embodiment of the inventive concept includes an article according to statement 83, wherein notifying a proxy device about the change in the configuration of the device further includes notifying the proxy device that the change in the configuration of the device was written to the Vital Product Data.

Statement 85. An embodiment of the inventive concept includes an article according to statement 80, wherein notifying a proxy device about the change in the configuration of the device includes:

receiving a query from the proxy device about a current status of the configuration of the device; and

sending a response to the proxy device including the change in the configuration of the device.

Consequently, in view of the wide variety of permutations to the embodiments described herein, this detailed description and accompanying material is intended to be illustrative only, and should not be taken as limiting the scope of the inventive concept. What is claimed as the inventive concept, therefore, is all such modifications as may come within the scope and spirit of the following claims and equivalents thereto.

Claims

1. A management device, comprising:

a communication logic to communicate with at least one device over one or more communication channels about data associated with the at least one device;
a reception logic to receive a query from a host, the query requesting information about the at least one device; and
a transmission logic to send a response to the host, the response including the data,
wherein the host is configured to send a message intended for the at least one device, and
wherein the management device acts as a proxy for the at least one device by sending the response to the host.

2. The management device according to claim 1, wherein the management device is configured to communicate with the at least one device over the one or more communication channels about the data before the reception logic receives the query from the host.

3. The management device according to claim 1, further comprising a read logic to read the data from a product data for the at least one device.

4. The management device according to claim 1, wherein:

the management device further comprises a polling logic to poll the at least one device for the data; and
the reception logic is operative to receive the data from the at least one device.

5. The management device according to claim 1, wherein:

the management device is in a chassis;
the chassis includes storage associated with the management device; and
the management device is configured to create a log page from the data in the storage.

6. The management device according to claim 5, further comprising a log page creation logic to create the log page from the data about the at least one device.

7. The management device according to claim 5, wherein the transmission logic is operative to send the log page to the host responsive to the query.

8. A method, comprising:

accessing, by a management device, a data associated with at least one device;
receiving, at the management device, after accessing the data, a query from a host for the data, the query sent to the at least one device; and
sending the data from the management device to the host.

9. The method according to claim 8, wherein the management device is drawn from a set including a Baseboard Management Controller (BMC), a Redundant Array of Independent Disks (RAID) controller, a processor, or a software device.

10. The method according to claim 8, wherein the at least one device is drawn from a set including a storage device and a Network Interface Card (NIC).

11. The method according to claim 8, wherein accessing, by a management device, a data associated with at least one device includes reading, by the management device, the data from a product data.

12. The method according to claim 11, wherein reading, by the management device, the data from a product data includes reading, by the management device, the data from product data stored in an Electrically Erasable Programmable Read Only Memory (EEPROM).

13. The method according to claim 8, wherein accessing, by a management device, a data associated with at least one device includes:

polling the at least one device, by the management device, for the data; and
receiving the data at the management device from the at least one device.

14. The method according to claim 8, wherein accessing, by a management device, a data associated with at least one device includes accessing a datum from the at least one device when a configuration of the at least one device changes.

15. The method according to claim 8, wherein:

the method further comprises compiling the data into a record; and
sending the data from the management device to the host includes sending the record from the management device to the host.

16. The method according to claim 15, wherein compiling the data into a record includes creating a log page from the data.

17. The method according to claim 16, wherein sending the data from the management device to the host includes sending the log page from the management device to the host.

18. A system, comprising:

a chassis;
a processor in the chassis;
a device; and
a management device, including: a communication logic to communicate with the device over a communication channel about data associated with the device; a reception logic to receive a query from the processor, the query requesting information about the device; and a transmission logic to send a response to the processor, the response including the data,
wherein the processor is configured to send a message intended for the device, and
wherein the management device acts as a proxy for the device by sending the response to the host.

19. The system according to claim 18, wherein the management device is configured to communicate with the at least one device over the one or more communication channels about the data before the reception logic receives the query from the host.

Referenced Cited
U.S. Patent Documents
6295567 September 25, 2001 Bassman et al.
6345303 February 5, 2002 Knauerhase et al.
6427198 July 30, 2002 Berglund et al.
6611863 August 26, 2003 Banginwar
6662119 December 9, 2003 Mitchell
7107253 September 12, 2006 Sumner et al.
7120759 October 10, 2006 Chiu
7143153 November 28, 2006 Black et al.
7249173 July 24, 2007 Nicolson
7512585 March 31, 2009 Agarwal et al.
7536486 May 19, 2009 Sadovsky et al.
7620854 November 17, 2009 Kuttan et al.
7873700 January 18, 2011 Pawlowski et al.
7882393 February 1, 2011 Grimes et al.
7944812 May 17, 2011 Carlson et al.
8065347 November 22, 2011 DeMeyer et al.
8180862 May 15, 2012 Baker et al.
8396981 March 12, 2013 Lee et al.
8599863 December 3, 2013 Davis
8667224 March 4, 2014 Yu
8832327 September 9, 2014 Lin
8943234 January 27, 2015 Voorhees et al.
8949517 February 3, 2015 Cohen et al.
8953644 February 10, 2015 Chandra et al.
8998636 April 7, 2015 Gomez et al.
9037786 May 19, 2015 Asnaashari et al.
9047222 June 2, 2015 Chandra et al.
9092321 July 28, 2015 Salessi
9244865 January 26, 2016 Hutchison et al.
9244877 January 26, 2016 Yang et al.
9253275 February 2, 2016 Bhogal et al.
9280357 March 8, 2016 Shaver et al.
9280504 March 8, 2016 Ben-Michael et al.
9389805 July 12, 2016 Cohen et al.
9400749 July 26, 2016 Kuzmin et al.
9460042 October 4, 2016 Iskandar et al.
9465756 October 11, 2016 Bennett
9648148 May 9, 2017 Rimmer et al.
9653124 May 16, 2017 Heyd et al.
9734093 August 15, 2017 Khemani et al.
9734106 August 15, 2017 Kotzur et al.
9785346 October 10, 2017 Yost
9785355 October 10, 2017 Huang
9785356 October 10, 2017 Huang
9811481 November 7, 2017 Bhatia et al.
9830082 November 28, 2017 Srinivasan et al.
9842084 December 12, 2017 Friedman et al.
9904330 February 27, 2018 Schuette et al.
9906596 February 27, 2018 Sikdar
9934173 April 3, 2018 Sakalley et al.
9934183 April 3, 2018 Brassac et al.
9959240 May 1, 2018 Mundt
9965367 May 8, 2018 Shih
9990313 June 5, 2018 Monji et al.
10019388 July 10, 2018 Long et al.
10063638 August 28, 2018 Huang
10108450 October 23, 2018 Pinto et al.
10114778 October 30, 2018 Worley et al.
10162784 December 25, 2018 Bassett et al.
10206297 February 12, 2019 Breakstone et al.
10223313 March 5, 2019 Shih
10223316 March 5, 2019 Mataya
10235313 March 19, 2019 Lee et al.
10255215 April 9, 2019 Breakstone et al.
10275356 April 30, 2019 Chou et al.
10289517 May 14, 2019 Beerens
10289588 May 14, 2019 Chu et al.
10318443 June 11, 2019 Su
10346041 July 9, 2019 Olarig et al.
10372648 August 6, 2019 Qiu
10372659 August 6, 2019 Olarig et al.
10394723 August 27, 2019 Yang et al.
10452576 October 22, 2019 Stuhlsatz
10467163 November 5, 2019 Malwankar et al.
10467170 November 5, 2019 McKnight
10474589 November 12, 2019 Raskin
10560550 February 11, 2020 Xue et al.
10592144 March 17, 2020 Roberts et al.
10733137 August 4, 2020 Kachare et al.
10866911 December 15, 2020 Qiu et al.
10901927 January 26, 2021 Fischer et al.
10929327 February 23, 2021 Schrempp et al.
10942666 March 9, 2021 Pydipaty et al.
11113046 September 7, 2021 Bowen et al.
11126352 September 21, 2021 Olarig
11347740 May 31, 2022 Moshe et al.
20020087887 July 4, 2002 Busam et al.
20020095491 July 18, 2002 Edmonds et al.
20020123365 September 5, 2002 Thorson et al.
20030058818 March 27, 2003 Wilkes et al.
20040073912 April 15, 2004 Meza
20040111590 June 10, 2004 Klein
20040147281 July 29, 2004 Holcombe et al.
20040153844 August 5, 2004 Ghose et al.
20050025125 February 3, 2005 Kwan
20050060442 March 17, 2005 Beverly et al.
20050120157 June 2, 2005 Chen et al.
20060059287 March 16, 2006 Rivard et al.
20060095625 May 4, 2006 Wootten et al.
20060098681 May 11, 2006 Cafiero et al.
20060136621 June 22, 2006 Tung et al.
20060202950 September 14, 2006 Lee et al.
20070077553 April 5, 2007 Bentwich
20080003845 January 3, 2008 Hong et al.
20080288708 November 20, 2008 Hsueh
20090073896 March 19, 2009 Gillingham et al.
20090077478 March 19, 2009 Gillingham et al.
20090217188 August 27, 2009 Alexander et al.
20090222733 September 3, 2009 Basham et al.
20090259364 October 15, 2009 Vollmer et al.
20100077067 March 25, 2010 Strole
20100100858 April 22, 2010 Schipper
20100106836 April 29, 2010 Schreyer et al.
20100169512 July 1, 2010 Matton et al.
20110131380 June 2, 2011 Rallens
20110151858 June 23, 2011 Lai
20120056728 March 8, 2012 Erdmann et al.
20120102580 April 26, 2012 Bealkowski
20120207156 August 16, 2012 Srinivasan et al.
20120311654 December 6, 2012 Dougherty, III et al.
20130117503 May 9, 2013 Nellans et al.
20130117766 May 9, 2013 Bax et al.
20130179624 July 11, 2013 Lambert et al.
20130198311 August 1, 2013 Tamir et al.
20130198312 August 1, 2013 Tamir et al.
20130242991 September 19, 2013 Basso et al.
20130282953 October 24, 2013 Orme et al.
20130304979 November 14, 2013 Zimmer et al.
20130311795 November 21, 2013 Cong et al.
20130318371 November 28, 2013 Hormuth
20130325998 December 5, 2013 Hormuth et al.
20140032641 January 30, 2014 Du
20140052928 February 20, 2014 Shimoi
20140122746 May 1, 2014 Shaver et al.
20140195711 July 10, 2014 Bhatia et al.
20140258679 September 11, 2014 McGee
20140281458 September 18, 2014 Ravimohan
20140317206 October 23, 2014 Lomelino et al.
20140330995 November 6, 2014 Levy et al.
20140344431 November 20, 2014 Hsu et al.
20150006758 January 1, 2015 Holtman et al.
20150039815 February 5, 2015 Klein
20150067188 March 5, 2015 Chakhaiyar
20150086017 March 26, 2015 Taylor et al.
20150106660 April 16, 2015 Chumbalkar et al.
20150120874 April 30, 2015 Kim et al.
20150120971 April 30, 2015 Bae et al.
20150138900 May 21, 2015 Choi
20150178095 June 25, 2015 Balakrishnan et al.
20150181760 June 25, 2015 Stephens
20150205541 July 23, 2015 Nishtala et al.
20150234815 August 20, 2015 Slik
20150254088 September 10, 2015 Chou et al.
20150255130 September 10, 2015 Lee et al.
20150261434 September 17, 2015 Kagan et al.
20150286599 October 8, 2015 Hershberger
20150301757 October 22, 2015 Iwata
20150301964 October 22, 2015 Brinicombe et al.
20150304423 October 22, 2015 Satoyama et al.
20150324312 November 12, 2015 Jacobson et al.
20150331473 November 19, 2015 Jreji et al.
20150350096 December 3, 2015 Dinc et al.
20150370661 December 24, 2015 Swanson et al.
20150370665 December 24, 2015 Cannata et al.
20150376840 December 31, 2015 Shih
20150381734 December 31, 2015 Ebihara et al.
20160004879 January 7, 2016 Fisher et al.
20160062936 March 3, 2016 Brassac et al.
20160077841 March 17, 2016 Lambert et al.
20160085718 March 24, 2016 Huang
20160092390 March 31, 2016 Grothen et al.
20160094619 March 31, 2016 Khan et al.
20160127468 May 5, 2016 Malwankar et al.
20160127492 May 5, 2016 Malwankar et al.
20160146754 May 26, 2016 Prasad et al.
20160188313 June 30, 2016 Dubal et al.
20160246754 August 25, 2016 Rao et al.
20160259597 September 8, 2016 Worley et al.
20160283428 September 29, 2016 Guddeti
20160306723 October 20, 2016 Lu
20160306768 October 20, 2016 Mataya
20160328344 November 10, 2016 Jose et al.
20160328347 November 10, 2016 Worley et al.
20160337272 November 17, 2016 Berman
20160366071 December 15, 2016 Chandran et al.
20170018149 January 19, 2017 Shih
20170038804 February 9, 2017 Shows et al.
20170063965 March 2, 2017 Grenader
20170068268 March 9, 2017 Giriyappa et al.
20170068628 March 9, 2017 Calciu et al.
20170068630 March 9, 2017 Iskandar et al.
20170168943 June 15, 2017 Chou et al.
20170185554 June 29, 2017 Fricker
20170187629 June 29, 2017 Shalev et al.
20170206034 July 20, 2017 Fetik
20170262029 September 14, 2017 Nelson et al.
20170269871 September 21, 2017 Khan et al.
20170270001 September 21, 2017 Suryanarayana et al.
20170270060 September 21, 2017 Gupta et al.
20170286305 October 5, 2017 Kalwitz
20170317901 November 2, 2017 Agrawal et al.
20170344259 November 30, 2017 Freyensee et al.
20170344294 November 30, 2017 Mishra et al.
20170357299 December 14, 2017 Shabbir et al.
20170357515 December 14, 2017 Bower, III et al.
20180004695 January 4, 2018 Chu et al.
20180019896 January 18, 2018 Paquet et al.
20180032463 February 1, 2018 Olarig et al.
20180032469 February 1, 2018 Olarig et al.
20180032471 February 1, 2018 Olarig
20180052745 February 22, 2018 Marripudi et al.
20180074717 March 15, 2018 Olarig et al.
20180074984 March 15, 2018 Olarig et al.
20180095904 April 5, 2018 Bunker et al.
20180101492 April 12, 2018 Cho et al.
20180131633 May 10, 2018 Li
20180173652 June 21, 2018 Olarig et al.
20180210517 July 26, 2018 Yun
20180227369 August 9, 2018 DuCray et al.
20180267925 September 20, 2018 Rees
20180275919 September 27, 2018 Chirumamilla
20180307650 October 25, 2018 Kachare et al.
20180373609 December 27, 2018 Beerens
20190042424 February 7, 2019 Nair
20190087268 March 21, 2019 Koltsidas et al.
20190104632 April 4, 2019 Nelson et al.
20190286584 September 19, 2019 Olarig et al.
20190339888 November 7, 2019 Sasidharan et al.
20200042217 February 6, 2020 Roberts et al.
20200117663 April 16, 2020 Moshe et al.
20200293916 September 17, 2020 Li
20210342281 November 4, 2021 Olarig et al.
20220188002 June 16, 2022 Olarig
20220206693 June 30, 2022 Jung et al.
Foreign Patent Documents
1641568 July 2005 CN
101847429 May 2012 CN
104025063 September 2014 CN
104202197 December 2014 CN
104572516 April 2015 CN
104615577 May 2015 CN
105260275 January 2016 CN
105912275 August 2016 CN
103412769 November 2017 CN
2290497 March 2011 EP
2843557 March 2015 EP
2001290752 October 2001 JP
4257050 April 2009 JP
2010146525 July 2010 JP
2011048534 March 2011 JP
2012506184 March 2012 JP
2013041390 February 2013 JP
2014241545 December 2014 JP
2015049742 March 2015 JP
2015191649 November 2015 JP
2015194005 November 2015 JP
2015532985 November 2015 JP
2016037501 March 2016 JP
2016045968 April 2016 JP
WO2015194005 April 2017 JP
20090106469 October 2009 KR
20120135205 December 2012 KR
20150047785 May 2015 KR
20150071898 June 2015 KR
20160074659 June 2016 KR
201445325 December 2014 TW
2014209764 December 2014 WO
2015049742 April 2015 WO
2015191649 December 2015 WO
2016037501 March 2016 WO
2016085016 June 2016 WO
Other references
  • Corrected Notice of Allowability for U.S. Appl. No. 15/256,495, dated Mar. 18, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/424,474, dated Feb. 22, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/202,079, dated Jan. 27, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/921,923, dated Feb. 18, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/424,474, dated Mar. 29, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/921,923, dated Apr. 1, 2021.
  • Final Office Action for U.S. Appl. No. 16/844,995, dated Mar. 29, 2021.
  • Notice of Allowance for U.S. Appl. No. 15/403,088, dated Oct. 22, 2018.
  • OC3D, “What is the New U.2 SSD Connection?,” (https://www.overclock3d.net/news/storage/what_is_the_new_u_2_ssd_connection/1), Jul. 2016, retrieved Apr. 12, 2021, 5 pages.
  • Office Action for U.S. Appl. No. 15/403,088, dated Jun. 7, 2018.
  • Wikipedia, “SATA Express,” (https://en.wikipedia.org/wiki/SATA_Express), retrieved Apr. 12, 2021, 6 pages.
  • Wikipedia, “U.2,” (https://en.wikipedia.org/wiki/U.2), retrieved Apr. 12, 2021, 2 pages.
  • Advisory Action for U.S. Appl. No. 15/256,495, dated Feb. 1, 2019.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/202,079, dated Jul. 22, 2020.
  • Fang, Chin, “Using NVMe Gen3 PCIe SSD Cards in High-density Servers for High-performance Big Data Transfer Over Multiple Network Channels”, SLAC National Accelerator Laboratory, Stanford University, Stanford, California, Feb. 7, 2015, 17 pages.
  • Final Office Action for U.S. Appl. No. 15/256,495, dated Dec. 4, 2019.
  • Final Office Action for U.S. Appl. No. 15/256,495, dated Oct. 19, 2018.
  • Final Office Action for U.S. Appl. No. 15/345,509, dated Feb. 21, 2019.
  • Final Office Action for U.S. Appl. No. 15/411,962, dated Dec. 20, 2018.
  • Final Office Action for U.S. Appl. No. 16/424,474, dated May 1, 2020.
  • Notice of Allowance for U.S. Appl. No. 15/256,495, dated Mar. 5, 2020.
  • Notice of Allowance for U.S. Appl. No. 15/345,507, dated Feb. 19, 2019.
  • Notice of Allowance for U.S. Appl. No. 15/411,962, dated Mar. 18, 2019.
  • Notice of Allowance for U.S. Appl. No. 16/202,079, dated Jun. 1, 2020.
  • Notice of Allowance for U.S. Appl. No. 16/421,458, dated Apr. 15, 2020.
  • Notice of Allowance for U.S. Appl. No. 16/424,474, dated Jul. 15, 2020.
  • NVM Express over Fabrics specification Revision 1.0; NVM Express Inc.; Jun. 5, 2016. (Year 2016).
  • Office Action for U.S. Appl. No. 15/256,495, dated Jun. 14, 2019.
  • Office Action for U.S. Appl. No. 15/256,495, dated Mar. 29, 2018.
  • Office Action for U.S. Appl. No. 15/345,507, dated Dec. 3, 2018.
  • Office Action for U.S. Appl. No. 15/345,509, dated Apr. 29, 2020.
  • Office Action for U.S. Appl. No. 15/345,509, dated Nov. 29, 2019.
  • Office Action for U.S. Appl. No. 15/345,509, dated Sep. 10, 2018.
  • Office Action for U.S. Appl. No. 15/345,509, dated Sep. 28, 2020.
  • Office Action for U.S. Appl. No. 15/411,962, dated Aug. 10, 2018.
  • Office Action for U.S. Appl. No. 16/202,079, dated Aug. 22, 2019.
  • Office Action for U.S. Appl. No. 16/202,079, dated Mar. 4, 2020.
  • Office Action for U.S. Appl. No. 16/421,458, dated Dec. 30, 2019.
  • Office Action for U.S. Appl. No. 16/424,474, dated Feb. 3, 2020.
  • Office Action for U.S. Appl. No. 16/424,474, dated Oct. 15, 2019.
  • Office Action for U.S. Appl. No. 16/844,995, dated Sep. 4, 2020.
  • Office Action for U.S. Appl. No. 16/857,172, dated Oct. 8, 2020.
  • Office Action for U.S. Appl. No. 16/921,923, dated Oct. 28, 2020.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/256,495, dated May 13, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Jun. 15, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/921,923, dated May 26, 2021.
  • Notice of Allowance for U.S. Appl. No. 15/345,509, dated May 13, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/202,079, dated May 14, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/424,474, dated Apr. 30, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/857,172, dated May 3, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/202,079, dated Jul. 12, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/921,923, dated Jul. 14, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Aug. 11, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Dec. 10, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/692,997, dated Jun. 18, 2020.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/844,995, dated Dec. 9, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/950,624, dated Jul. 16, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/950,624, dated Jun. 10, 2021.
  • Final Office Action for U.S. Appl. No. 16/211,923, dated Aug. 19, 2019.
  • Final Office Action for U.S. Appl. No. 16/692,997, dated Mar. 26, 2020.
  • Final Office Action for U.S. Appl. No. 17/063,501, dated Nov. 2, 2021.
  • Final Office Action for U.S. Appl. No. 17/063,507, dated Nov. 22, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/211,923, dated Sep. 13, 2019.
  • Notice of Allowance for U.S. Appl. No. 16/692,997, dated Jun. 1, 2020.
  • Notice of Allowance for U.S. Appl. No. 16/950,624, dated May 10, 2021.
  • OC3D, “What is the New U.2 SSD Connection?” OC3D News, Jul. 2016, (https://www.overclock3d.net/news/storage/what_is_the_new_u_2_ssd_connection/1), retrieved May 2018, 4 pages.
  • Office Action for U.S. Appl. No. 16/202,079, dated Dec. 9, 2021.
  • Office Action for U.S. Appl. No. 16/211,923, dated May 6, 2019.
  • Office Action for U.S. Appl. No. 16/692,997, dated Dec. 19, 2019.
  • Office Action for U.S. Appl. No. 16/950,624, dated Jan. 25, 2021.
  • Office Action for U.S. Appl. No. 17/063,501, dated Jul. 15, 2021.
  • Office Action for U.S. Appl. No. 17/063,507, dated Aug. 6, 2021.
  • SSD Form Factor Work Group, “Enterprise SSD Form Factor 1.0a”, 2012, SSD Form Factor Work Group, pp. 1-55. (Year: 2012).
  • Wikipedia, “SATA Express”, (https://en.wikipedia.org/wiki/SATA_Express), retrieved May 2018, 6 pages.
  • Wikipedia, “U.2”, (https://en.wikipedia.org/wiki/U.2), retreived May 2018, 3 pages.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Aug. 30, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Oct. 27, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/202,079, dated Sep. 15, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/857,172, dated Aug. 20, 2021.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/921,923, dated Aug. 24, 2021.
  • Notice of Allowance for U.S. Appl. No. 16/844,995, dated Sep. 29, 2021.
  • Office Action for U.S. Appl. No. 17/022,075, dated Oct. 15, 2021.
  • Notice of Allowance for U.S. Appl. No. 15/345,509, dated Feb. 8, 2022.
  • Notice of Allowance for U.S. Appl. No. 16/202,079, dated Mar. 17, 2022.
  • Office Action for U.S. Appl. No. 16/844,995, dated Feb. 22, 2022.
  • Office Action for U.S. Appl. No. 17/063,501, dated Feb. 24, 2022.
  • Office Action for U.S. Appl. No. 17/063,507, dated Mar. 17, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Jun. 10, 2022.
  • Final Office Action for U.S. Appl. No. 17/022,075, dated May 25, 2022.
  • Notice of Allowance for U.S. Appl. No. 17/063,501, dated Jun. 2, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Jun. 27, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/202,079, dated Jul. 7, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 17/063,501, dated Jul. 7, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 17/063,501, dated Jun. 23, 2022.
  • Final Office Action for U.S. Appl. No. 17/063,507, dated Jun. 27, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Aug. 8, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/202,079, dated Aug. 17, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 17/063,501, dated Jul. 27, 2022.
  • Office Action for U.S. Appl. No. 17/408,365, dated Aug. 2, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 15/345,509, dated Sep. 7, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/202,079, dated Aug. 31, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 17/022,075, dated Sep. 6, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 17/063,501, dated Aug. 24, 2022.
  • Notice of Allowance for U.S. Appl. No. 16/844,995, dated Aug. 26, 2022.
  • Notice of Allowance for U.S. Appl. No. 17/022,075, dated Aug. 23, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 16/844,995, dated Oct. 20, 2022.
  • Corrected Notice of Allowability for U.S. Appl. No. 17/063,501, dated Oct. 13, 2022.
  • Notice of Allowance for U.S. Appl. No. 17/063,507, dated Oct. 7, 2022.
  • Office Action for U.S. Appl. No. 17/230,989, dated Oct. 31, 2022.
  • Office Action for U.S. Appl. No. 17/376,145, dated Sep. 30, 2022.
Patent History
Patent number: 11543965
Type: Grant
Filed: Nov 16, 2020
Date of Patent: Jan 3, 2023
Patent Publication Number: 20210072898
Assignee:
Inventors: Sompong Paul Olarig (Pleasanton, CA), Son T. Pham (San Ramon, CA)
Primary Examiner: Glenn A. Auve
Application Number: 17/099,776
Classifications
Current U.S. Class: Shared Memory Area (711/147)
International Classification: G06F 3/06 (20060101); G06F 11/30 (20060101); G06F 13/16 (20060101); G06F 13/40 (20060101); G06F 15/177 (20060101);